Cross-site Request Forgery (CSRF) Affecting wasmcloud package, versions <1.5.0-r0


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.14% (34th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Request Forgery (CSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-WOLFILATEST-WASMCLOUD-15422456
  • published5 Mar 2026
  • disclosed30 May 2025

Introduced: 30 May 2025

CVE-2024-12224  (opens in a new tab)
CWE-352  (opens in a new tab)

How to fix?

Upgrade Wolfi wasmcloud to version 1.5.0-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream wasmcloud package and not the wasmcloud package as distributed by Wolfi. See How to fix? for Wolfi relevant fixed versions and status.

Improper Validation of Unsafe Equivalence in punycode by the idna crate from Servo rust-url allows an attacker to create a punycode hostname that one part of a system might treat as distinct while another part of that system would treat as equivalent to another hostname.

CVSS Base Scores

version 3.1